1. L.V. Ahn, A. Bortz, N.J. Hopper, k-Anonymous message transmission, in: 10th ACM Conference on Computer and Communications Security, Washington DC, USA, October 2003, pp. 112–130
2. J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, S. Yi, Routing through the mist: Privacy preserving communication in ubiquitous computing environments, in: International Conference of Distributed Computing Systems, ICDCS 2002, Vienna, Austria, July 2002
3. H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003
4. S.A. Cook, The complexity of theorem-proving procedures, in: 3rd Annual ACM Symposium on Theory of Computing, STOC’71, Shaker Heights, OH, USA, March 1971, pp. 151–158
5. J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies in wireless sensor networks, in: IEEE 2004 International Conference on Dependable Systems and Networks, DSN’04, Florence, Italy, June 2004